Speaker Handouts
These are the handouts received from speakers so far. Check back often to see if additional handouts have been submitted by speakers.
A3. Exploring Emerging Cyber Attest Requirements
A5. National Guard Cyber Defense & You!
A6. 50 Shades of Grey - Ethical Challenges of Today's CSO
A5. National Guard Cyber Defense & You!
A6. 50 Shades of Grey - Ethical Challenges of Today's CSO
B2. Managing the Burdens of Compliance Across Frameworks, Clients and Auditing Entities
B4. Its Not Magic: Threat Hunting at Scale with Decision Trees, Regressions, and Clustering
B6. The Value of Security: A Framework for Proving Your Program's Effectiveness
C1. BeyondCorp - Google Security for Everyone Else
C2. Achieving Continuous Risk Management
C6. Business Folds: Security Doesn't
C7. Automated, Risk-based Vulnerability Management – Financial Impact Quantified - 1st Document
D5. Defending Against Ransomware, You Already have the Capability and it’s FREE
D6. Effective Guide to Vetting Threat Intelligence for Improved Operation
E2. Building a PKI with Open Source Tools
E3. Conducting an Information Security/Privacy Risk Assessment
E4. PathWell: Password Topology Histogram Wear-Leveling
G1. The Aftermath of a Fuzz Run: What to Do About Those Crashes?
G2. Tears in the Clouds: The Challenges of Effectively Managing Access Controls in Cloud Implementations
G2. Tears in the Clouds: The Challenges of Effectively Managing Access Controls in Cloud Implementations